CISO Desk Reference Guide
  • Home
  • Foundation
    • CISO DRG Volume 1
    • CISO DRG Volume 2
    • Executive Primer
  • Practitioner
    • Breaking In: The Mid-Career Guide to Cybersecurity
    • The Essential Guide to Cybersecurity for SMBs
    • Develop Your Cybersecurity Career Path
    • Cyber Crisis Response
    • Application Security for CISOs
    • Case Studies
  • Governance
    • Data Privacy Program Guide
  • SMBs
    • Creating a Small Business Cybersecurity Program
    • Protect Your Business and Protect Your Practice
  • Excerpts
    • CISO Desk Reference Guide Volume 1
      • Ch 1 The Empowered CISO
      • Ch 2 The Human Element
      • Ch 3 You will be Judged by Your Policy
      • Ch 4 To Tell a Story with Metrics Report It
      • Ch 5 Are Your Board Ready?
      • Ch 6 Communicating Risk to Senior Leadership
      • Ch 7 Risks Covered by Cyber Insurance
      • Ch 8 How Much Risk Do My Third Parties Have?
      • Ch 9 A Data-Driven Perspective on Cybersecurity
      • Ch 10 Legislation Is Changing Cybersecurity
    • CISO Desk Reference Guide Volume 2
      • Ch 11 Techniques and More Techniques
    • Cyber Crisis Response
      • Introduction
      • Section 1 Perception and Reality
    • Data Privacy Program Guide
      • Ch 1 Why Privacy Matters
      • Ch 8 Privacy by Design
    • Protect Your Practice
      • Improve Your Security with These Ten Steps
  • Readers’ Guide
  • Announcements
  • The Authors
    • Bill Bonney
    • Gary Hayslip
    • Matt Stamper
    • Josiah Dykstra
    • Chris Forbes
    • Chris Foulon
    • David Goodman
    • Andrew Gorecki
    • Nitzan Levi
    • Andrea Little Limbago
    • Helen Patton
    • Justine Phillips
    • Christopher Scott
    • Yuval Sinay
    • Renee Small
    • Alan Watkins
Select Page

Executive Primer

by Bill Bonney | Feb 9, 2020

Section 1 – Executive Partnership

Organizational Structure
Management and the Board
Regulatory, Compliance and Audit
Cyber Risk Management
Third Party Risk

Section 2 – Executive Sponsorship

Measuring and reporting
The Cyber Program
Build Cyber Resilience
Cyber Incident Recovery
The strategic Plan

Recent Posts

  • How highly effective CISOs lean forward with proactive risk management
  • Protect Your Practice and Protect Your Business
  • Cyber Crisis Response: Leveraging the SONAR Method to Accelerate Response and Recovery
  • What is the interview process like for CISOs?
  • Third Edition of the CISO Desk Reference Guide, Volume 1 and 2 released together

Recent Comments

    Archives

    • September 2024
    • May 2024
    • February 2024
    • July 2023
    • March 2023
    • February 2023
    • January 2023
    • August 2022
    • July 2022
    • March 2022
    • February 2022
    • October 2021
    • August 2021
    • July 2021
    • June 2021
    • April 2021
    • February 2021
    • December 2020
    • September 2020
    • August 2020
    • June 2020
    • April 2020
    • February 2020
    • January 2020
    • December 2019
    • July 2019
    • June 2019
    • July 2018
    • June 2018
    • May 2018
    • August 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016

    Categories

    • Article
    • Creating a Small Business Cybersecurity Program
    • Blog
    • Bill Article
    • Gary Article
    • Matt Article
    • The Essential Guide to Cybersecurity for SMBs
    • Bring Your Own Cyber
    • Executive Primer
    • Uncategorized
    • CISO DRG Vol 1
    • CISO Desk Reference Guide
    • CISO DRG Vol 2

    Copyright  © 2019-2021 CISO DRG – All Rights Reserved.

    By continuing to browse our site, you agree to the storing of cookies on your device to enhance this site’s navigation and analysis of site usage.

    Privacy Policy Acceptable Use Policy Cookie Policy Got it
    Policies

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT